Questions for Unesco's Comprehensive Study on Internet Related Issues

Total Page:16

File Type:pdf, Size:1020Kb

Questions for Unesco's Comprehensive Study on Internet Related Issues QUESTIONS FOR UNESCO'S COMPREHENSIVE STUDY ON INTERNET RELATED ISSUES Submitted by admin on Fri, 27/06/2014 ­ 23:32 From now until November 2014, UNESCO is asking for inputs and research around this global questionnaire on Internet­related issues in the four areas of access to information and knowledge, freedom of expression, privacy, and ethical dimensions of the information society. The questions also explore the intersections between these areas and options for future UNESCO action in these fields. The findings, on topics which relate to UNESCO’s mandate, will feed into a comprehensive Internet­related study mandated by UNESCO’s 195 Member States through Resolution 52 of the Organization’s 37th General Conference (November 2013). Contributions can be submitted through this open online questionnaire or at the many conferences where UNESCO organizes consultation events. Other comments and questions can be sent to [email protected] NOTE: Your written contribution will be published on the UNESCO website after submission. Name EPHRAIM PERCY KENYANITO Gender * Male E­mail *[email protected] Category of Stakeholder * Civil Society and NGOs including individual users Others: please specify Name of Organization or affiliation: Access (AccessNow.Org) Country * Kenya Region * Africa 1 Access (AccessNow.org) is an international organization that defends and extends the digital rights of users at risk around the world. By combining innovative policy, user engagement of our global community of nearly half a million members around the world, and direct technical support we fight for open and secure communications for all. We welcome this opportunity to submit comment on UNESCO’s Internet Universality study. Given the breadth of the study’s questions, we have chosen to focus on a subsection of questions that most directly pertain to our mandate. For any questions or comments please contact Access Policy Director Jochai Ben­Avie ([email protected]) or Policy Fellow Ephraim Kenyanito ([email protected]). A. Questions related to the field of Access to information and knowledge 1.What can be done to reinforce the right to seek and receive information in the online environment? Access notes that a recently (November 2014) released survey of Internet users in 24 countries has found that 83% believe affordable access to the internet should be a basic human right, according to the “CIGI­Ipsos Global Survey on Internet Security and Trust.” This overwhelming sentiment speaks to the fact that the internet is perhaps the greatest democratizing force in the history of the fight to realize Article 19 of the ICCPR, enabling billions to seek, receive, and impart information like never before. Yet, even as more and more individuals come online for the first time, freedom of expression online is under unprecedented threat, particularly from threats of surveillance, net discrimination and censorship. To reinforce this right, existing protections must be enforced and new policies and regulations are needed to ensure adequate protection of this fundamental freedom. A. Surveillance As the former UN Special Rapporteur on Freedom of Expression Frank La Rue noted in a report last year: The right to privacy is often understood as an essential requirement for the realization of the right to freedom of expression. Undue interference with individuals’ privacy can both directly and indirectly limit the free development and exchange of ideas. Restrictions of anonymity in communication, for example, have an evident chilling effect on victims of all forms of violence and abuse, who may be reluctant to report for fear of double 2 victimization. In this regard, article 17 of ICCPR refers directly to the protection from interference with “correspondence”, a term that should be interpreted to encompass all forms of communication, both online and offline. As the Special Rapporteur noted in a previous report, the right to private correspondence gives rise to a comprehensive obligation of the State to ensure that e­mails and other forms of online communication are actually delivered to the desired recipient without the interference or inspection by State organs or by third parties. (p. 7) The Snowden revelations have at once revealed the staggering scope and scale of interference with the right to privacy of virtually all of the world’s users by the U.S., U.K., and other governments, while at the same time giving rise to the chilling effect on freedom of expression that La Rue describes. A recent study by the PEN America Center reveals that 28 percent of writers surveyed has “curtailed or avoided activities on social media,” with another 12 percent saying they had seriously considered doing so. The PEN study illustrates the urgent need for surveillance reform to ensure freedom of expression online. The International Principles on the Application of Human Rights to Communications Surveillance (“the Principles”), which have been endorsed by more than 400 civil society organizations from around the world, provide a framework for assessing how international law applies when conducting communications surveillance. In a recent landmark report on “The Right to Privacy in the Digital Age,” UN High Commissioner for Human Rights Navi Pillay stated that the Principles can be considered interpretive guidance of Article 17 of the ICCPR. Simply put, state action to adopt, comply with, and implement the Principles would significantly and substantively reinforce the right to seek and receive information in the online environment. B. Net neutrality Critical to ensuring the internet’s continued success as a bastion of free expression, is the prevention of net discrimination, which can be understood as interference with the three core principles of net neutrality: 1) that all points in the network should be able to connect to all other points in the network (the end to end principle); 2) that all providers of the internet should make their best efforts to deliver traffic from point to point as expeditiously as possible (the best efforts principle); and 3) that everyone should be able to innovate without permission from anyone or any entity (the innovation without permission principle). Net neutrality means that all traffic on the internet is treated on an equal basis, no matter the origin, type of content, or means (e.g. equipment or protocols) used to transmit internet traffic. Any deviation from this principle (for instance for traffic management purposes) must be 3 proportionate, temporary, targeted, transparent, and in accordance with relevant laws. If these criteria are not respected, users then face network discrimination. It is our recommendation that UNESCO and other UN Agencies supports legislation prohibiting net discrimination as a critical means to ensuring the free flow of information online. Additional resources on net discrimination and how to ensure the protection of net neutrality and thereby the right to free expression can be found here. B. Questions related to the field of Freedom of Expression 6. What are the current and emerging challenges relevant to freedom of expression online? To summarize, Access notes that some of the current and emerging challenges relevant to freedom of expression online include: ­ Invasive and disproportionate policy responses ­ Threats to civil society organizations, activists, citizen journalists and bloggers ­ Regime change and political risks that undermine digital rights As the WSIS Forum 2012 & 2013 Booklet on Identifying Emerging Trends and a Vision Beyond 2015 notes, there are increasing challenges in addressing freedom of expression and privacy in the digital age. The liability of intermediaries and governmental surveillance also negatively impact freedom of expression and right to privacy on internet. Moreover, we have documented cyberattacks on journalists and bloggers, who are targeted specifically for the opinions they hold and express online (e.g., https://www.accessnow.org/blog/2013/06/19/access­submits­upr­report­on­vietnam­cyber­attack s­on­civil­society­a­key­c). We are also concerned about the use of invasive and disproportionate policy responses that can imperil human rights and economic development. This is especially true of legislation enacted in the name of cybersecurity, from the U.S. (e.g., https://www.accessnow.org/blog/2014/07/15/access­calls­for­president­obama­to­pledge­to­veto ­cisa) to the African Union (e.g., https://www.accessnow.org/blog/2014/08/22/african­union­adopts­framework­on­cyber­security­ and­data­protection) and elsewhere. Access operates the only 24/7, international digital security helpline, offering real­time, direct technical assistance and advice to activists, independent media, and civil society organizations. 4 As part of this work, we have witnessed growing and varied attacks on civil society actors endangering freedom of expression. [Adittionally, Access has also documented about fake domains attacks that impersonate civil society and news organizations and we have provided recommendations towards mitigating such attacks (https://www.accessnow.org/page/­/docs/FakeDomainsReport.pdf )] 7. How can legislation in a diverse range of fields which impact on the Internet respect freedom of expression in line with international standards? Legislation impacting on free expression online should be developed in a multistakeholder fashion in line with the 2005 Tunis Agenda. Multistakeholderism is considered best practice in internet policymaking and is critical to ensuring that the
Recommended publications
  • Exhibit a Case 3:16-Cr-00051-BR Document 545-2 Filed 05/11/16 Page 2 of 86
    Case 3:16-cr-00051-BR Document 545-2 Filed 05/11/16 Page 1 of 86 Exhibit A Case 3:16-cr-00051-BR Document 545-2 Filed 05/11/16 Page 2 of 86 Executive Order 12333 United States Intelligence Activities (As amended by Executive Orders 13284 (2003), 13355 (2004) and 134 70 (2008)) PREAMBLE Timely, accurate, and insightful information about the activities, capabilities, plans, and intentions of foreign powers , organizations, and persons, and their agents, is essential to the national security of the United States. All reasonable and lawful means must be used to ensure that the United States will receive the best intelligence possible. For that purpose, by virtue of the authority vested in me by the Constitution and the laws of the United States of America, including the National Security Act of 1947, as amended, (Act) and as President of the United States of America, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as follows: PART 1 Goals, Directions, Duties, and Responsibilities with Respect to United States Intelligence Efforts 1.1 Goals. The United States intelligence effort shall provide the President, the National Security Council, and the Homeland Security Council with the necessary information on which to base decisions concerning the development and conduct of foreign, defense, and economic policies, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal. (a} All means, consistent with applicable Federal law and this order, and with full consideration of the rights of United States persons, shall be used to obtain reliable intelligence information to protect the United States and its interests.
    [Show full text]
  • The Proposed Authorities of a National Intelligence Director: Issues for Congress and Side-By-Side Comparison of S
    Order Code RL32506 CRS Report for Congress Received through the CRS Web The Proposed Authorities of a National Intelligence Director: Issues for Congress and Side-by-Side Comparison of S. 2845, H.R. 10, and Current Law Updated October 5, 2004 -name redacted- Specialist in Intelligence and National Security Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress The Proposed Authorities of a Director of National Intelligence: Issues for Congress, and Side-by-Side Comparison of S. 2845, H.R. 10, and Current Law Summary The 9/11 Commission, in its recent report on the attacks of September 11, 2001, criticized the U.S. Intelligence Community’s (IC) fragmented management structure and questioned whether the U.S. government, and the IC, in particular, is organized adequately to direct resources and build the intelligence capabilities that the United States will need to counter terrorism, and to address the broader range of national security challenges in the decades ahead. The Commission made a number of recommendations, one of which was to replace the current position of Director of Central Intelligence (DCI) with a National Intelligence Director (NID) who would oversee national intelligence centers on specific subjects of interest — including a National Counterterrorism Center (NCTC) — across the U.S. government, manage the national intelligence program; oversee the agencies that contribute to it; and have hiring, firing, and budgetary authority over the IC’s 15 agencies. Although the Commission recommended that the director be located in the Executive Office of the President, the Commission Vice Chairman in testimony before Congress on September 7, 2004, withdrew that portion of the recommendation in light of concerns that the NID would be subject to undue influence.
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]
  • Drug Enforcement Administration
    350 Fifth Avenue, 34th Floor New York, NY 10118-3299 Tel: +1-212-290-4700 Fax: +1-212-736-1300; 917-591-3452 Kenneth Roth, Executive Director Freedom of Information & Privacy Act Unit (SARF) Deputy Executive D i r e c t o r s Michele Alexander, Development and Global Initiatives Drug Enforcement Administration Nicholas Dawes, Media Iain Levine, Program 8701 Morrissette Drive Chuck Lustig, Operations Springfield, VA 22152 Bruno Stagno Ugarte, Advocacy Emma Daly, Communications Director Dinah PoKempner, General Counsel January 18, 2017 James Ross, Legal and Policy Director Division and Program Directors Brad Adams, Asia To Whom It May Concern: Daniel Bekele, Africa Maria McFarland Sánchez-Moreno, United States Alison Parker, United States Through this letter, Human Rights Watch (“HRW”) requests copies of José Miguel Vivanco, Americas Sarah Leah Whitson, Middle East and North Africa documents pursuant to the Freedom of Information Act, 5 U.S.C. § 552. Hugh Williamson, Europe and Central Asia Shantha Rau Barriga, Disability Rights Peter Bouckaert, Emergencies We request these documents on an expedited basis; we also seek a public Zama Coursen-Neff, Children’s Rights Richard Dicker, International Justice interest fee waiver and news media fee status. Bill Frelick, Refugees’ Rights Arvind Ganesan, Business and Human Rights Liesl Gerntholtz, Women’s Rights As explained below, our request concerns final or working policy and Steve Goose, Arms Diederik Lohman, acting, Health and Human Rights other documents that relate to the ability of the Drug Enforcement Graeme Reid, Lesbian, Gay, Bisexual, and Transgender Rights Administration (“DEA”) to obtain access to communications and related Advocacy Directors Maria Laura Canineu, Brazil data that the US government has acquired under 50 U.S.C.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Introduction the Intelligence Community (IC) – General Information
    Guide to Posted Documents Regarding Use of National Security Authorities – Updated as of January, 2020 Contents Introduction .................................................................................................................................................. 1 The Intelligence Community (IC) – General Information .............................................................................. 1 IC Framework for Protecting Civil Liberties and Privacy and Enhancing Transparency ................................ 3 Reports on Use of National Security Authorities. ......................................................................................... 5 Section 702: - Overviews............................................................................................................................... 6 Section 702: Targeting and Minimization ..................................................................................................... 7 Section 702: Compliance, Oversight, and Other Documents ....................................................................... 8 FISA: Other Provisions ................................................................................................................................... 9 FISA: FISC and FISCR Opinions..................................................................................................................... 10 Executive Order 12333 ................................................................................................................................ 11 Presidential
    [Show full text]
  • Executive Order 12333, 46 Fed Reg 59941
    CR 0680A West1avv. Exec. Order No. 12333 Page I Exec. Order No. 12,333, 1981 WL 76054 (Pres.Exec.Order), 46 FR 59941 (Cite as: 46 FR 59941) Executive Order 12333 United States I ntelligence Activities December 4, 1981 *59941 Timely and accurate information about the activities, capabilities, plans, and intentions of foreign powers, organizations, and persons and their agents, i s essential to the national security of the United. States. All reasonable and lawful means must be used to ensure that the United States will receive the b e st intelli­ gence available. For that purpose, by virtue of the authority vested i n me by the Constitution and statutes of the United States of America, including the National Security Act of 1947, as amended, and as President of the Uni ted States of Amer­ ica, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as foll ows: *59942 Part 1 Goals, Direction, Duties and Responsibilities With Respect to the National Intel­ ligence Effort 1.1 Goals. The United States intelligence effort shall provide the President and the National Security Council with the necessary information on which t o base de ­ cisions concerning the conduct and development of foreign, defense a nd economic policy, and the protection of United States national interests f rom foreign secur­ ity threats. All departments and agencies shall cooperate fully to fulfill this goal. (a) Maximum emphasis should be given to fostering analytical competition among appropriate elements of the Intelligence Community.
    [Show full text]
  • C06229027 "'Ecri2i//NOF'orn
    C0 6229027 Approved for Release: 2015/04/29 C06229027 "'ECRi2I//NOF'ORN CIA and EO 12333: Overview for the ICIG Boston Review Forum June 2013 Outline of Talking Points • Framework of Legal/Policy Authorities • EO 12333 Purpose, Historical Background, and Structure • USP And Foreign/National Intelligence Definitions • CIA's Duties and Responsibilities • Collection, Retention, and Dissemination of USP Information • HR 7-l On Collection: Purpose, Location, Target, and Technique • HR 7-1 Collection • HR 7-1 Retention Criteria (b)(1) • HR 7-1 Dissemination (b)(3) NatSecAct • Additionall2333/HR 7-J Topics Detailed Talking Points NATIONAL SECURITY ACT OF 1947 • LEGAL FRAMEWORK. CIA is governed by a framework of authorities, from the U.S. Constitution, to statutes including the National Security Act of 1947, as amended, (50 USC 401 , et seq.) and the CIA Act of 1949, as amended (50 USC 403a-x) to executive orders including EO 12333, "U.S. Intelligence Activities" (FR vol. 40, No 235 of December 8, 1981) o Constitution • First Amendment- freedom of speech, right to peaceably assemble • Fourth Amendment- unreasonable searches, warrants upon probably cause • Fifth Amendment- due process for life, liberty, or property o NSA47 - the "who's who" and Congressional intent . • Director of Central Intelligence Agency responsibilities (50 USC 403-4a(d)) : • (1) "Collect intelligence through human sources and by other appropriate means, except that the DCIA shaU have no police, subpoena, or law enforcement powers or internal security functions" • (2) "Correlate
    [Show full text]
  • 1 About Executive Order 12333, United States Intelligence Activities
    OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE CIVIL LIBERTIES AND PRIVACY OFFICE CIVIL LIBERTIES AND PRIVACY INFORMATION PAPER: DESCRIPTION OF CIVIL LIBERTIES AND PRIVACY PROTECTIONS INCORPORATED * IN THE 2008 REVISION OF EXECUTIVE ORDER 12333 About Executive Order 12333, United States Intelligence Activities. Executive Order 12333 establishes the Executive Branch framework for the country’s national intelligence efforts, and for protecting privacy and civil liberties in the conduct of intelligence activities. It was originally issued by President Ronald Reagan in 1981. It was most recently revised and re-issued by President George W. Bush in 2008. About this Information Paper. The ODNI's Civil Liberties and Privacy Office (CLPO) originally prepared this information paper in August 2008 and made it available to interested members of the public, to describe the civil liberties and privacy protections incorporated in the 2008 revision of Executive Order12333. In August, 2013, CLPO reformatted the content of that original paper for posting on www.dni.gov. New text is indicated with brackets, and in one instance, text was moved to improve readability (noted in endnotes); otherwise, the content is unchanged. This paper furthers one of the main goals under CLPO’s Civil Liberties and Privacy Enterprise Strategy, to provide appropriate transparency to mission partners, oversight bodies, Congress, and the American public into the Intelligence Community’s (IC) civil liberties and privacy protections. About CLPO. CLPO is led by the “Civil Liberties Protection Officer,” a position established by Section 103D of the National Security Act of 1947, with duties that include ensuring that the protection of civil liberties and privacy is appropriately incorporated in the policies and procedures of Intelligence Community elements, and overseeing compliance by the ODNI with requirements under the Constitution and all laws, regulations, Executive order, and implementing guidelines relating to civil liberties and privacy.
    [Show full text]
  • 1 Attorney General Approved U.S. Person Procedures
    ATTORNEY GENERAL APPROVED U.S. PERSON PROCEDURES UNDER E.O. 12333 March 2021 Executive Order 12333, United States Intelligence Activities (available starting at page 693 at this link), establishes the Executive Branch framework for the country’s national intelligence efforts, and for protecting privacy and civil liberties in the conduct of intelligence activities. It was originally issued by President Ronald Reagan in 1981. It was most recently revised and re-issued by President George W. Bush in 2008. ODNI released an information paper to explain the 2008 changes. Part 1 of the Order lays out the various roles and responsibilities of our national security and intelligence elements of the Executive Branch. Restrictions on the conduct of intelligence activities are contained in Part 2 of the Executive Order. Definitions and general terms are addressed in Part 3. Under Section 2.3, Intelligence Community (IC) elements may collect, retain, and disseminate information concerning United States persons pursuant to procedures established by the head of the IC element and approved by the Attorney General after consultation with the DNI (also known as the “Attorney General Guidelines”). Over the last 10 years, IC elements, the Department of Justice, and the Office of the Director of National Intelligence have worked to update these Attorney General procedures. The updates have been designed to ensure that the protections for U.S. person information are appropriately designed to protect privacy and civil liberties the digital environment in which the Intelligence Community conducts its activities. Consistent with the Principles of Intelligence Transparency, these procedures have been redrafted to be as unclassified as permissible and were proactively released to the public when they were completed.
    [Show full text]
  • NSA's Civil Liberties and Privacy Protections for Targeted SIGINT Activities Under Executive Order 12333 October 7, 2014
    NSA Director of Civil Liberties and Privacy Office Report NSA's Civil Liberties and Privacy Protections for Targeted SIGINT Activities Under Executive Order 12333 October 7, 2014 Rebecca J. Richards Director, NSA Civil Liberties and Privacy Office EXECUTIVE SUMMARY This report, from the NSA Civil Liberties and Privacy Office, addresses the general civil liberties and privacy protections employed by the NSA and more specifically documents additional procedures for targeted Signals Intelligence activities under Executive Order (E.0.) 12333. The Fair Information Practice Principles (FIPPs), which are the widely accepted framework of defining principles used by federal agencies to evaluate how systems, processes, or programs affect individual privacy, were used as the basis for assesessment. The report finds that NSA has multiple activities that provide civil liberties and privacy protections for six of the eight FIPPs (Purpose Specification, Data Minimization, Use Limitation, Data Quality and Integrity, Security, and Accountability and Auditing). These protections are underpinned by NSA's management activities, documented compliance program, and investments in people, training, tools and technology. Because NSA has a national security mission, the principles of Transparency and Individual Participation are not implemented in the same manner they are in organizations with a more public-facing mission. NSA cannot offer direct Transparency because that would alert foreign intelligence targets that they are under surveillance. NSA can only offer Individual Participation in limited instances for the same reason. In many cases, NSA overseers provide surrogate means for these two principles. NSA is interested in exploring ideas with those in government, the public and expert groups on how to strengthen these protections.
    [Show full text]
  • DHS/ALL/PIA-086 DHS Counterintelligence Program Page 1
    Privacy Impact Assessment for the DHS Counterintelligence Program DHS Reference No. DHS/ALL/PIA-086 August 31, 2020 Privacy Impact Assessment DHS/ALL/PIA-086 DHS Counterintelligence Program Page 1 Abstract The U.S. Department of Homeland Security (DHS) Counterintelligence (CI) Program is a Department-wide effort designed to detect, deter, and disrupt foreign intelligence threats directed at the United States. CI encompasses those activities that identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents (including transnational criminal organizations and drug trafficking organizations conducting intelligence-related activities), or international terrorist organizations or activities, collectively hereinafter referred to as foreign intelligence entities (FIE).1 DHS is conducting this Privacy Impact Assessment (PIA) because the DHS CI Program requires access to, collection of, and storage of personally identifiable information (PII) associated with individuals who are either involved in, witness to, or knowledgeable of CI-related activities that are the subject of inquiry by DHS, or supporting CI activities conducted by the DHS CI Program. Overview The DHS CI Program is a coordinated Department effort to detect, deter, and disrupt foreign intelligence threats directed at the United States. Within DHS, only two Components are members of the Intelligence Community (IC): the Office of Intelligence & Analysis (I&A) and the U.S. Coast Guard (USCG), which each have different authorities under Executive Order (EO) 12333 “United States Intelligence Activities” 2 (as well as through their own statutory authorities, which are explained in more detail below).
    [Show full text]